That’s Sooo 2020! Without question, 2020 was a year of changes in the world that would’ve been utterly unimaginable prior to it. As with most crises, Emergency Communications Centers (ECCs) have been on the front lines of this pandemic from day one. The result – major adjustments in priorities happened almost overnight, backup plans have now become, well, just “the plan,” and new awkward uncertainties surround even our most basic interactions with others. Make no mistake, history has been written, ensuring anything described as being, “so 2020,” going forward will not be intended as flattery. COVID-19 Is Reshaping Emergency Communication Centers COVID-19 has inarguably brought tremendous new challenges and changes to the operations of ECCs, thereby the daily work and lives of the teams that make them go. By now it’s hard to fathom many of those changes not living on long after this pandemic. However, through adversity comes learning. There may finally be some light at the end of the tunnel regarding ways COVID-19 is reshaping emergency communications centers. We’ve had to learn through this real-life worst-case scenario as it developed right in front of us. We saw firsthand how a modern-day worldwide public health crisis can stretch our operational capacities and norms to new thresholds, and in some cases, past their breaking points. A required result of COVID-19 must be new insight and action plans for dealing with the next crisis, as vaccines will obviously not provide an enduring panacea, impenetrable to whatever the next worldwide or local emergency may bring. 5 Ways COVID-19 Changes ECCs In a newly published white paper, 5 Ways COVID-19 is Reshaping Emergency Communications Centers, we outline key changes that have taken, and continue to take place directly as a result of the pandemic. While the list is obviously not exhaustive and will continue to evolve, it entails a handful of significant and unquestionably key trends that in aggregate, demonstrates the fluidity, resilience, and dire needs of our critical front-line teams and functions. The white paper provides detailed information and references to resources on the following ways the pandemic is changing the ECC landscape, as well a brief look at what’s ahead: • Rising Need for Remote Capabilities • Renewed Calls for Alternative Funding • Increasing Demand for Partnerships • Shifting Focus Towards Intelligence • Heightened Emphasis on Health and Safety We invite you to download a free copy of the white paper today for more in-depth information on what’s changing, and/or post your comments on if you agree, disagree, or other notable changes you’re seeing occur as well. By: Jim Shulkin Want to know about new posts? Subscribe today and receive periodic alerts on what’s new on the Zetron Z-wire blog!
The Zetron Blog: Z-Wire
Comms Connect Melbourne is perennially Australia’s go-to source for thought leadership on mission critical communications, providing an opportunity to meet and hear from hundreds of like-minded radio and communications users and industry professionals annually. This year’s event, as so many others have, went virtual as a result of the global pandemic. In addition to serving as a panelist during this year’s virtual event, Zetron’s Randy Richmond also delivered a video presentation, titled “Answering 5 Important Questions About integrating Mission Critical PTT with Control Rooms,” as part of the conference track on Private LTE – ensuring there is coverage, capacity and control for the private LTE network of the future. Randy’s presentation explains how the new global Mission Critical LTE standards are no longer the future, but rather the here and now. Ready to be deployed for voice, video and data applications to aid critical infrastructure users, including those in public safety, utilities, transportation, and other markets. View the on demand presentation to learn more about how critical infrastructure control rooms integrate with LTE networks (private, commercial or national) and are making use of Mission Critical LTE Push-to-Talk (MCPTT) in the broadband migration from narrowband Land Mobile Radio (LMR). To watch the on-demand video, click here. For more information, please feel free to connect with our Zetron Asia Pacific Headquarters at email@example.com. By: Kimberly Kapustein Want to know about new posts? Subscribe today and receive periodic alerts on what’s new on the Zetron Z-wire blog!
Thanks to advances in technology, organizations which depend on critical communications have greater access to data and communications in more places than ever before, and leading technology companies like Tait and Zetron are taking advantage of this by joining forces to deliver unified critical communications solutions. Take Your Dispatch Console Wherever You Go Historically, dispatch consoles were restricted to Public Safety and Utility dispatch centers, but technology partners Tait and Zetron are changing that through their mutual commitment to a broad range of technologies and open standards-based radio interfaces. This collaboration has resulted in a unique solution that combines the mobile radio and broadband connectivity of Tait Unified Vehicle with the Zetron ACOM Command & Control dispatch solution’s remote operation capabilities. By integrating these solutions, Tait and Zetron are making it easier for organizations to quickly set up consoles in different locations whenever necessary. Combining Tait Unified Vehicle and Zetron ACOM The Zetron ACOM dispatch solution allows users to deploy a laptop or tablet with just a USB headset to set up remote, temporary, back-up, mobile and training positions quickly and securely. Unlike other console solutions that are limited to just a few channels, ACOM has no channel limit, providing you with a mobile console system with full capabilities. To operate ACOM, you need internet access, and the broadband connectivity required is provided by Tait Unified Vehicle with a powerful antenna that can transmit and receive high speed data. To allow a tablet or laptop with the ACOM software access to these networks, Tait Unified Vehicle creates a mobile Wi-Fi network, giving you the ability to connect your devices to the internet. Tait Unified Vehicle also provides LMR connectivity so dispatchers can communicate through the radio network, or through broadband Push-To-Talk services. This means that if for any reason LTE service is lost, you still have the reliable coverage from analog, P25 or DMR networks as a back up. Three Use Cases During large-scale emergency events, remote stations might need to be set up to get first responders closer to the scene. Similarly, it enables Utilities crews that respond to events such as hurricanes to set up a console to help keep everyone connected. Another potential use case takes place in the actual control room. Suppose you lose internet connectivity from your normal provider – the console could then stay connected through a Tait Unified Vehicle unit providing LTE connectivity. Most organizations have multiple mobile radios in their control room, so converting those radios to Tait Unified Vehicle units offers an extra layer of protection and back-up connectivity. Lastly, suppose a manager or field worker needs to access the ACOM console for any reason. Instead of driving to the control room, they can simply access it through their tablet or laptop whenever and wherever they are with Tait Unified Vehicle providing the broadband connectivity for internet access. By: Tait Communications Originally posted on the Tait Blog Want to know about new posts? Subscribe today and receive periodic alerts on what’s new on the Zetron Z-wire blog!
You’re not alone! It’s no secret, Emergency Communications Centers (ECCs) across the US (and world) are facing increasing call volumes, while also managing critical staffing shortages. Add to this the never-ending changes in technology, performance expectations, and evolving industry Quality Assurance (QA) standards and it’s clear to see how public safety agencies are stretched too thin. So it’s no wonder they have limited time and resources to create or effectively manage a successful QA program, especially when policy writing, standard operating procedures (SOPs) editing, and training updates are required. Can you relate? Why outsource such an important responsibility? Getting external help with meeting Quality Assurance requirements doesn’t mean an agency is unable to create or manage its own program, nor does it require “giving up control” of policy development, training, or personnel improvement. Hiring a professional and certified QA service team means you understand the value of giving precious time back to overworked teams, reducing error-related risks, and improving operations by utilizing professional and consistent QA evaluations. Teaming up with the right QA Program Services partner benefits an agency in many ways, here’s just a few to think about: Reduce Stress First, QA evaluations are time consuming. They must be thorough, detailed, and provide appropriate coaching feedback. Many ECCs simply don’t have the time or resources to conduct and adequately report their evaluations. A qualified third party can alleviate some of the associated stress in this process by shouldering many of the requirements, including conducting QA evaluations, implementing feedback loops, providing job improvement aids, and developing Quality Improvement (QI) training plans. Apply Objectivity Without proper controls in place, internal call reviews can lead to favoritism and/or over-discipline. By working with an objective third party, inherent or developed biases can be eliminated, significantly increasing consistent and professional performance improvements. Reduce Expense Many agencies either pay overtime or juggle shift coverage in order to have personnel available to run QA programs. Or they simply complete QA tasks only when time permits. Outsourcing can reduce or even eliminate the unplanned expenses, helping keep them on time and on budget. Ensure Compliance Existing QA operations, or soon-to-be established programs, can be reviewed and assessed by a qualified third party to ensure the center is on track to meet APCO/NENA ANSI and other relevant industry standards, or work towards accreditation goals if desired. Additionally, outsourcing QA enables compliance to endure without additional recertification expense when full time staff leave the center. Frequent and Regular Updates A qualified third party outsourcing service keeps agencies up to date on changes to industry-accepted QA standards, policies, protocols, best practices, and performance feedback technologies as they are developed, implemented and adapted. Service Customization In addition to frequent updates, QA professional services providers can eliminate the reliance on “out of the box” or “one-size-fits-all” QA software and services that often fail to fully address a PSAP’s unique requests and diverse needs. Faster Results By outsourcing, agencies avoid the time consuming process of designing their own QI program and training feedback loops, enabling them to achieve performance goals sooner. Reduce Liability Coupled with policy editing, a professionally managed QA/QI evaluation program can identify weak performance areas and work proactively to recommend, write, and implement improvement plans before potentially costly mistakes occur. This helps agencies avoid expensive errors, reactionary revisions of SOPs, and costly retraining of staff. Is it time to think about outsourcing components or all of your agency’s QA Program? If so, take a look at the information sheet on Zetron’s QA Program Services and let us know if you’d like to discuss your agency’s specific needs. By: Paul Guest Want to know about new posts? Subscribe today and receive periodic alerts on what’s new on the Zetron Z-wire blog!
Zetron was pleased to sponsor and attend this year’s NENA Ignite 2020 Virtual Conference. This unique event made the session content and opportunities to network highly accessible and convenient, despite there not being an in person event this year. There are two significant benefits of this year’s virtual conference format: 1) Once registered as an attendee (which is FREE), you can access on-demand education sessions all the way through October 24. 2) The opportunity to connect live with 911 community partners via the virtual expo. Please visit the links below to see Zetron at this free-to-attend virtual event that offers you various ways to learn, grow, connect, and discover. We hope to see you next year at NENA 2021 in person. Register Click here first to register Once registered, follow the links below for valuable content and to engage with Zetron: Watch this on-demand panel, including of Zetron’s Diane Harris, Co-Chair for the Joint APCO/NENA Management of the EIDO Working Group, on The Future of Inter-Agency Communications. Visit the Zetron Virtual Booth By: Kimberly Kapustein Want to know about new posts? Subscribe today and receive periodic alerts on what’s new on the Zetron Z-wire blog!
Estimated reading time: 20 minute(s) All organizations must re-think how they manage their business as it relates to security, and in the case of solution providers specifically, how they deliver secure solutions to customers as well. Many vendors still haphazardly think of cybersecurity as a box that just has to get checked in an RFP in order to successfully sell their solutions. As if it was simply a matter of buying security off the shelf. However, the days of installing virus protection on computers and calling it good have long been over. Many executives still roll their eyes when discussions turn to cybersecurity. However, in today’s tech-driven world, it’s impossible to overlook the risks and exposure that cybersecurity threats pose to virtually every business. Billions of dollars are spent every year on defending against, and in some cases acquiescing to ransomware attacks, which are just one varietal of the many cybersecurity threats that are now prevalent. Bringing Security Front and Center Security now must be front and center with a core commitment that encapsulates all aspects of a business, including both internal and external factors. Security must be cultural in an organization and be given the same consistent commitment and investment that makes is a core business priority, no different than you would a quality initiative. Instilling a strong security culture (i.e., mindset and mode of operation) must be ingrained in corporate philosophy in order for it to be effective and maintained. It is not a project that has a start and an end date, but more a sustainable program that must continually advance and evolve through continued investment in order to keep up with the ever-changing and new threats. It’s no longer an IT- or Engineering-only issue. It’s top down, bottom up, cross department, cross vendor, and should be prominently considered as part of virtually every significant business decision. It must be instilled in the culture. So how do you make security cultural in an organization? You can’t simply wake up one morning and proclaim your solutions or organization are secure. There is a progression to security that enables some organizations to be more secure than others and the timelines to hardening security can typically be measured in years, not weeks or months. As with any other cultural growth initiative in an organization, it must start as an executive commitment and/or charter. Most manufacturing and software organizations have a charter that states something related to “delivering quality solutions.” Security should be put on a similar pedestal. In fact, I would argue it’s a core component of achieving quality today. How can you say you deliver a quality solution if your customer’s data centers, networks or other assets are unnecessarily subject to security breaches as a result of vulnerabilities in your solution? Does security not then become a quality-impacting issue? The ability of your solution to maintain availability, confidentiality, and integrity within a customer environment is as much a factor of quality as any material defects or bugs are. It starts with a corporate charter that identifies security as a priority to be considered in daily, weekly, monthly, quarterly and annual planning. Like any other organizational charter, leadership must make room for the investment and resourcing required to make the security program a success. This is by far the biggest issue many companies face in moving towards security hardening – underestimating the resource and investment requirements to make it successful and sustainable. Once an executive commitment, funding plan, and directive have been established, the next step is to define a specific security standard/program to follow. It’s important to formalize a security program framework with a documented set of information security policies, procedures, guidelines, and standards. The framework provides a common language for understanding, managing, and expressing cybersecurity risks and goals to internal and external stakeholders. Security Frameworks There are many security frameworks, such as the one developed by the National Institute of Standards & Technology (NIST) as it’s guidelines for cybersecurity. NIST best practices generally apply to physical security, policies, training, IT networks and communications systems. The current version of the NIST framework can be found at here. Any security program should include a road map for effective security management practices and controls. Having a security program will help ensure the confidentiality, integrity, and availability of the solutions provided, as well as protect business networks and operations. Using a framework helps identify and prioritize actions for reducing cybersecurity risk, as well as align business policies and technological approaches to managing risk. Many companies hire specialized consulting firms to help organize and implement a security framework. But whether consultants or internal resources are leveraged, it should be run as a formalized program within the organization. Identify Security Profile Once a security framework is established, the next step is to identify the current security profile based on the guidelines identified in the framework. This basically means identifying the current state in meeting the guidelines and what level of policy and process are in place to achieve success. For example, as a high level NIST breaks this evaluation down into four tiers: • Tier1 Partial – Ad-hoc and reactive • Tier2 Risk Informed – Approved policy and process in rolling out program • Tier3 Repeatable – Actively exercise policy and processes with change control implemented • Tier4 Adaptive – Policy is adapted to real cybersecurity activities This is a key component to developing and improving a security culture. The organization needs to be honest about its current state and starting point relative to the cybersecurity guidelines. Self-assessment will require cross department representation and can take a significant investment of time to do thoroughly and accurately. Fortunately, once you have completed this foundational work it will be much easier to maintain your profile going forward. Prioritize Cybersecurity Gaps The next step is to prioritize cybersecurity gaps (i.e., vulnerabilities) and identify what changes need to be made (i.e., target profile) within a specific timeline (i.e., road map) that makes sense and is practical for the business. Prioritization of items in the target profile is based on addressing items that pose the highest risk to the business first. This should be an iterative process, continually improving and expanding the security profile towards achieving Tier4 compliance. Rolling out a successful security program means getting all employees trained and providing clear visibility to the program and status. Visibility to the program across all levels of the organization is key, and it should be integrated into core business processes (e.g., product life-cycle process and program management office). Creating a cyber-secure culture requires giving security the same level of attention as other core organizational objectives. Creating response plans to cybersecurity threats to the organization is only one facet. Others include customer recovery support plans and standardized assessments of potential risks posed by chosen partners and vendors. To make security cultural, it must be a center piece of the organization’s mission, vision and values. By: Gary Stidham Want to know about new posts? Subscribe today and receive periodic alerts on what’s new on the Zetron Z-wire blog!
Tech Talk Vlog – Integrating Mission Critical Push-to-Talk with Emergency Communications Centers, Part 1
Estimated reading time: 5 minute(s) By: Randy Richmond Recently recorded for the IWCE Virtual audience, Zetron’s video Tech Talk provides answers to important questions on integrating Mission Critical Push-to-Talk (MCPTT) with Emergency Communications Centers (ECCs). We’re now happy to share this insightful content, delivered by MCPTT subject matter expert Randy Richmond, as a Z-Wire vlog. Scroll down to view on YouTube. Interested in Mission Critical Push-to-Talk technology? Curious about what the technology will offer ECCs in contrast to LMR? Wondering what challenges are ahead for integrating MCPTT into existing ECC technology infrastructure? Do you regularly wear a propeller on your head? Ok, just joking on the last one, although fair warning that this is content intended to cover various technical aspects of MCPTT and ECC integration. So, if it’s technical answers you’re after regarding integrating MCPTT with ECCs, this video is a must and gets straight to the point (in less than 15 minutes): 1) How do the capabilities of MCPTT compare with those of LMR? 2) What is MCPTT Group Management, and why is it useful? 3) Can I upgrade an existing LMR console to do MCPTT? 4) Can an MCPTT console do LMR-to-MCPTT integration? 5) Is there an advantage to integrating MCPTT with GIS and CAD systems? 6) What about the MCPTT vendor’s dedicated MCPTT console? Enjoy the vlog and be on the look out soon for the second part of this mini-series where we’ll tackle more technical questions regarding MCPTT in ECCs, and other mission critical communications technology topics. Want to know about new posts? Subscribe today and receive periodic alerts on what’s new on the Zetron Z-wire blog!
Estimated reading time: 21 minute(s) Thanks for tuning in for installment #2 in our Public Safety Dispatch Center 100-series blog. In the 101 post (Public Safety Dispatch Centers 101 – Terminology & Systems) I talked about dispatch center terminology, roles, and systems. In this post, I’ll be talking about the flow of a typical 9-1-1 call. Before we dive in, in case you’ve wondered about the origin of “9-1-1” being written with hyphens between the digits, as opposed to just “911,” it has to do with every child in US public schools receiving instruction on how to dial for an emergency. When 9-1-1 was first introduced, it was in fact written as “911” without hyphens. But some people read this as “nine eleven,” and children were sometimes confused because there was no “11” key on their phone. So it was changed to be written and spoken as “9-1-1” or “nine one one” (i.e., never “nine eleven”) to avoid confusion. OK, let’s get started. Figure 1 below illustrates the basic call flow of a typical 9-1-1 call. 1. A 9-1-1 call is generally initiated by on inbound call (or text) from a citizen dialing “9”, “1”, “1” (or in the case of an older PBX, an outside line prefix such as “9” may be needed first, no longer required for new PBXs because of Kari’s Law). Regardless of whether the call is from a wired analog phone, a cell phone, or a VoIP system, the call gets routed to the public switched telephone system (PSTN) where it gets special treatment. LOCATION 2. This process includes an attempt to locate the rough origin of the call, either by a street address (using the wired phone company’s records), or if wireless, by locating the cell site that the call is coming from. Based on this rough location, a database of Emergency Communications Centers (ECCs, also known as PSAPs) is searched to find the one that most likely covers that rough area. The call is then routed to that ECC. 3. At the ECC, the emergency call taking system begins to ring. If the ECC has Automatic Call Distribution (ACD) the call will be routed to the next available public safety telecommunicator (PST). If the ECC doesn’t have an ACD, then the call rings at every PST’s phone, to be answered by whomever is available. Once answered, the PST’s display shows the rough location of the caller, as well as a call back number. Typically, 10 seconds after the call, a more precise location is provided for wireless callers (by FCC rule, it is supposed to be within 30 meters of the actual caller 90% of the time). If this more precise location is needed by the PST, they can request a location data update by clicking a button on their screen. 4. The location is typically displayed both textually, and on a map via a Geographic Information System (GIS) CALLER DIALOG A PST will typically answer a call with “9-1-1, what is your emergency?” They are first trying to verify whether their ECC is the right one to handle this call, and if not, they will transfer the call appropriately. The answering ECC may have received a call that is from an adjacent jurisdiction (cell sites don’t fall on ECC boundaries). Or they may have received a call that is not for the public safety discipline they dispatch (e.g., the primary ECC may only dispatch for law enforcement, and the caller may have a need for fire or EMS). The first ECC to answer a call is the “Primary” ECC (or PSAP). An ECC that receives a transferred call is the “Secondary” ECC. 5. Once the right ECC has been established, the answering PST will ask additional questions of the caller to determine if and what kind of action the reported incident requires. If action is required, it becomes a “dispatchable incident” and the PST will enter the incident into their Computer Aided Dispatch (CAD) system. The CAD system, armed with the incident’s location and type, will then recommend which first responder field units should respond. At this point dispatch can be initiated. While dispatch is occurring, the answering PST may stay on the phone with the caller to talk the caller through ways to handle or mitigate the emergency. In the case of medical emergencies, the answering PST can give pre-arrival instructions on first aid and CPR to aid citizens on-scene until medics arrive. Sometimes the answering PST will remain with the caller until the dispatched first responders arrive on scene. DISPATCH 6. Dispatch can either occur automatically via data for field units equipped with mobile CAD terminals, or manually via voice transmitted through a Dispatch Console. In the case of voice dispatching, in small centers, the same PST who answered the call, also does the dispatching. In larger centers, there may be PSTs dedicated only to call taking, and others dedicated only to dispatching, and CAD is used to pass the incident information to the right dispatching PST (all PSTs, regardless of duties, will typically have access to CAD). In the case of data dispatching via mobile CAD, the data is typically sent via cellular data service (including present-day FirstNet). 7. Once field units are dispatched, CAD tracks who has been dispatched so that all PSTs know the status of their first responders. First responders actively involved in an incident are removed from the list of available resources and won’t be dispatched again until they clear themselves from the incident. First responders equipped with mobile CAD can clear themselves from an incident. Those without mobile CAD will radio in their status to the ECC dispatch PST. Often times, law enforcement (LE) responders are by themselves. Dispatch PSTs have a role in ensuring their safety. Every time an LE responder responds to an incident, their status is tracked in CAD. If the LE responder doesn’t respond again within a preset time threshold, their dispatcher is notified and the PST will then try to contact the LE responder to verify they are safe. Once dispatched, field units are often instructed to use a specific tactical Land Mobile Radio (LMR) channel with which to conduct their incident communications (especially in the Fire/EMS service). This ensures the main dispatch channel remains free for subsequent dispatching. RECORDING 8. All voice communications, including the 9-1-1 call and the radio dispatch traffic, are recorded on archival logging recorders. This is mandated by law in many states. The recording becomes part of the public record and can be obtained by FOIA (Freedom of Information Act) requests or lawyer subpoenas in court cases. But ECC supervisors also use recordings to survey the performance of PSTs to ensure the ECC’s policies are being met, and for training/coaching purposes to improve future responses. In addition to the long term archival recordings, various systems also record the most recent voice traffic and make it quickly accessible to the PSTs who were involved. This allows those PSTs to replay voice traffic that may not have been initially understood, and helps eliminate the need to ask for information to be repeated as new voice traffic. The recording systems can also record “meta data” associated with voice traffic. In the case of 9-1-1 callers, this can include the location and call back number of the caller. In the case of radio traffic, this can include the talker’s radio ID, status and in more advanced systems, the location of the first responder who was originating the traffic. Increasingly, archival logging recorders are also recording other data, such as CAD keystrokes, screen shots, and other info that can help recreate the sequence of events during an incident. For actual CAD records, the CAD system typically archives that information itself. That wraps up our Public Safety Dispatch Center 102 post on 9-1-1 call flows. If you have comments, questions, or points you’d like to add please post them. Stay tuned for installment #3, How Does 9-1-1 Know Where I Am? By: Randy Richmond Want to know about new posts? Subscribe today and receive periodic alerts on what’s new on the Zetron Z-wire blog!
Estimated reading time: 19 minute(s) Billed as the first communications network dedicated to emergency services, FirstNet promises to deliver a dynamic and reliable vehicle for first responders to transmit and receive critical data in the field. Built with today’s real-time technology in mind, this innovative service not only enables situational awareness but elevates it to the status of instant intelligence. However, the service and equipment aren’t free. And while many departments have no issue making room in their budgets for mission critical equipment and services, the numbers and statistics cannot answer a key question on the minds of public safety agencies we at Zetron work with every day. How will FirstNet change the way we work? It’s a great question. While the rollout and adoption of FirstNet (and other dedicated public safety networks around the world) is not happening overnight obviously, it’s advanced enough for us to now have a much better idea on how to answer that than we did even just a year ago. So let’s take a look. We’ll start with a summary of three high level, but highly important ways FirstNet is going to impact the daily lives of those in public safety. If you then decide you want to explore it deeper you’re in luck, because we have some additional informational resources we can offer to help you gain a deeper and more thorough understanding of the full impact that FirstNet and other national public safety broadband networks (NPSBNs) are going to have on Emergency Communications Centers (ECCs) but let’s talk high level impacts first. 3 ways FirstNet Will Impact the Daily Lives of those in Public Safety 1. Evolutionary Responder Awareness and Command Visibility Whether you’re an emergency dispatcher facilitating a multi-jurisdictional response to a natural disaster, a police officer responding to a report of shots fired, a firefighter searching for victims in a smoke-filled apartment building, or a paramedic juggling multiple patients at the scene of a mass casualty incident, the slightest shift in conditions could result in tragedy. Staying connected and cognizant of your situation and surroundings is crucial to doing the job effectively and ensuring everyone goes home safe. And while high profile incidents typically only make up a small percentage of calls, the ability to send and receive up to the minute information, communicate with your crew, and maintain real time location information accuracy for all responding personnel on every call is vital. Aside from ascertaining incident details via text and audio, FirstNet also enables connectivity for accessing the internet, querying internal databases, and easily viewing and/or streaming live on-scene footage. Plus, because the network integrates with both departmental and Internet of Things (IoT) data systems, and supports Pusg-to-talk (PTT) and VoIP technology, access to the latest update or nearest backup unit is only a click away. Speaking of interoperability, FirstNet transforms command visibility and takes resource coordination to another level. Besides enabling dispatchers, command supervisors, and field units to identify, deploy, and organize resources based on a real time, birds-eye view of the scene, FirstNet’s dynamic and flexible service allows for mobile crew coordination and inter-agency communication during peak air times without having to worry about bottlenecks or break downs due to congestion. 2. Uncompromising Coverage, Network Prioritization, and Service Reliability During special events, critical incidents, or disasters, traffic can flood the network making it difficult to get through. Worse still, weak signals or dropped calls can distort the message, leading to further chaos or confusion. This legacy, but very real and frustrating issue is slated to be a distant memory for public safety communications agencies on FirstNet. In fact, the network was constructed to ensure first responders receive lightning-fast, priority service, and a usable signal regardless of traffic or location. What this means is no matter the situation – there will be a signal, and the call will go through every time. And while that sounds like a tall order, keep in mind the entire system was forged on the promise of reliability, resilience, and redundancy. Whether it’s by extending the reach of your traditional radio system or empowering public safety with service capable of handling substantial data needs – FirstNet was built to stay on and keep working. Even when others can’t. 3. Advanced Data Security Data security is a hot button issue when it comes to emergency services. Whether you’re ensuring the confidentiality of a patient’s medical records in transit, preserving the integrity of digital evidence from a fire, or safeguarding vehicle data collected at a crash, as a professional, you must make sure the tools you use don’t compromise your effectiveness, or the credibility or liability of your agency. Unfortunately, that’s not all you have to worry about. Right now, we are at a crossroads for cybersecurity. Every day, across the nation, public safety agencies are finding themselves caught in a never-ending battle to defend their information systems from malicious actors, ransomware, or other cyber attacks. Having encrypted technology is no longer an afterthought. It’s integral to the mission and is why data security is yet another area where FirstNet excels. Because of the dynamic structure of FirstNet, both static and mobile data stays encrypted and secure throughout its journey. Meaning you can leverage mission critical data applications without worrying about sending sensitive information and it potentially falling into the wrong hands. Recapping from the Top To sum up, FirstNet will transform how public safety communicates. Instead of trying to adjust the approach to fit the limitations of the tools, first responders can focus on scene safety and mission success, knowing they have the right communication technology in place to support their capabilities. Besides enabling first responders to collaborate and make critical decisions based on the latest updates, FirstNet’s advanced security features allow responders to send and receive sensitive information without risking integrity or confidentiality. On top of that, the system functions as a force multiplier – enabling command to deploy, manage, expedite, and reallocate resources on the fly. But of course, the biggest advantage lies in FirstNet’s resiliency, redundancy, and ranking of network traffic. Simply put, FirstNet provides first responders peace of mind that they’ll always be connected with both field personnel and communications centers with a strong, clear signal – no matter the incident or location. As far as benefits go – you can’t put a value on that. Related Resources Ready to learn more about enhancing public safety communications through FirstNet or other NPSBNs? Check out some of our other new related resources today. eBook: The State of FirstNet: What Public Safety Officials Need to Know About Firstnet and How It Interworks with P25 Systems On Demand Webinar: The What, Why & How of FirstNet Integration for Emergency Communications Centers White Paper: The Importance of “FirstNet-Ready” for Mission Critical Communications By: Paul Guest Want to know about new posts? Subscribe today and receive periodic alerts on what’s new on the Zetron Z-wire blog!
Estimated reading time: 11 minute(s) In emergency communications, there’s a fine line between situational awareness and information overload. On one hand, it’s imperative to know what information to capture and relay to your units in the field. On the other, too much information can lead to confusion and hinder decision-making abilities for everyone involved. While you may not be able to eliminate the chaos or drown out the noise entirely, having uncluttered, easy-to-read screens can help you stay grounded, focused, and productive. For emergency dispatchers, keeping the most frequently used resources within arm’s reach is essential. However, this can be difficult for those who work in a communication center that handles 9-1-1 calls and radio traffic for multiple departments. For one, it’s impossible to know when and where the next emergency will happen. And two, depending on the situation, the resources you need can change within a fraction of a second. It’s vital to have the capability to shift gears quickly without losing track of units, assignments, or pending tasks. Call Taking Workstations As the point of entry into the 9-1-1 center, the call taking workflow is key to streamline and simplify tasks. An effective call queue set-up can distinguish emergency calls from non-emergency calls for faster response times on critical calls. Radio Dispatch Consoles Having your dispatch console screens configured in a manner that supports a busy dispatcher makes it much easier to rearrange resources, prioritize functions, identify users, broadcast alerts, initiate playback, and snooze distractions—helping you stay organized and in control no matter the call. CAD and Database Screens Managing a never-ending stream of caller updates, critical data, and responder requests can be overwhelming during busy shifts. Regardless of how experienced you are, it’s easy to overlook key details when you’re juggling an onslaught of calls and bouncing between multiple work screens. And though perfection is impossible, the truth is—in this business, errors can happen and reacting to them quickly is crucial. Your co-workers and your community are counting on you to get it right. While the ability to perform under pressure is by far a dispatcher’s most valuable asset, the tools you use can, and do affect the outcome, making it worthwhile to simplify as much as possible. Creating work screen configurations that enable you to send and receive updates, access, collect, assess, record, and share both static and dynamic information, can help your agency boost response times, ensure safety and improve effectiveness. GPS and AVL Displays Keeping track of callers, incidents, and unit locations isn’t always simple, though. Callers may not know or be able to accurately articulate where they are, and these events aren’t always static. Even worse, some incidents may take place in isolated areas with limited GPS coverage. Add to that the challenge of assignments that span several jurisdictions or require a multitude of resources, and you’ll see why having accurate and maneuverable mapping displays are, without a doubt, mission-critical. Since mapping accuracy is subject to the 9-1-1 data from the carrier, agency radio AVL/GPS technology and the various GIS map layers. As a result, many agencies have started investing in these tools to add to their arsenals and wishlists. Yet some of the newer platforms may not function properly with older communications technology. As a rule, mapping software should be set to automatically populate and update location status in real-time in correlation with 9-1-1, mobile unit, and CAD data systems. With that in mind, it’s important to ensure the GIS or AVL technology you choose integrates with your command and communication console and facilitates seamless information transfer across various networks, platforms, positions and screens. Going forward, the primary thing to remember is: while the goal of protecting life and property may be similar across all disciplines and locations—no two agencies are exactly alike. The emergency communications equipment you use should always complement and support your agency’s capabilities, capacity, and mission. By: Diane Harris, ENP & John Martyn Want to know about new posts? Subscribe today and receive periodic alerts on what’s new on the Zetron Z-wire blog!